CVE-2026-41286
Received Received - Intake
Stack-based Buffer Overflow in WatchGuard Agent Windows Service

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: WatchGuard Technologies, Inc.

Description
Stack-based Buffer Overflow vulnerability in the WatchGuard Agent discovery service on Windows allows Overflow Buffers. An unauthenticated attacker on the same local network could exploit this vulnerability to crash the agent service.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
watchguard agent to 1.25.02.0000 (inc)
watchguard agent 1.25.03.0000
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-121 A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a stack-based buffer overflow in the WatchGuard Agent discovery service on Windows. It allows an attacker on the same local network, without needing to authenticate, to exploit the overflow and cause the agent service to crash.


How can this vulnerability impact me? :

An attacker exploiting this vulnerability can crash the WatchGuard Agent discovery service, potentially causing denial of service on the affected system.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should upgrade the WatchGuard Agent on Windows to version 1.25.03.0000 or later, as this version resolves the stack-based buffer overflow issue.

No workaround is available, so applying the update is the only effective immediate step.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify any direct impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart